Those of us that have been around the NetIQ / Novell community for a while, have had many wishes for iManager to be a better tool. Unfortunately the “one console to rule them all” was never the real intent of the product. My recommendation is to use Apache Directory Studio (ADS) as a companion tool … Continue reading Easing the administration of your NetIQ Identity Vault

As an IdentityIQ implementation becomes more mature, there will inevitably be more applications connected. Depending on how the roles are set up, this will have one major consequence: provisioning the roles will take longer. The way IIQ will attempt to provision the roles, out of the box, is serially. It will run through each application … Continue reading split provisioning in sailpoint identityiq

Tivoli Identity Manager Installation & Integration Procedures for OIDSync RMI Adapter The following contains the steps necessary to install the new OIDSync RMI Adapter in the ITIM Environment. First, start with the Profile installation on ITIM (in this case the instructions necessary to install an OIDSync specific service profile on the ITIM 4.6 servers). 1. … Continue reading Tips & Tricks: How to Install the New OIDSync RMI Adapter for ITIM

SailPoint’s new provisioning engine allows you to create, modify, and delete user accounts on various applications in conjunction with the Lifecycle Request Manager component of SailPoint. ***NOTE: As with all Tips and Tricks we provide on the IDMWorks blog, use the following AT YOUR OWN RISK. We do not guarantee this will work in your … Continue reading Provisioning to Active Directory with SailPoint (using SSL)

The Unique Identifier, AKA the Unique ID, the UID, the Enterprise Unique ID, the Primary ID, the Global Unique ID. The UID is the key internal identifier, potentially used for authentication, authorization, group membership, and tracking (reporting, logging, auditing). It is recommended to have this ID be unfriendly so as to discourage its inappropriate use. … Continue reading Unique Identifiers and Why you shouldn’t let users select their own ID

Identity Management – Best Practices With the current regulations and audit requirements being placed on organizations, many companies are looking to Identity Management (IdM) solutions to help achieve control of who has access to what resources. This includes not only the provisioning of access rights, but also the ability to change access when individuals change … Continue reading Provisioning Roadmap